Cyberbullying and Social Anxiety: a Latent Class Analysis Among Spanish Adolescents

Total Page:16

File Type:pdf, Size:1020Kb

Cyberbullying and Social Anxiety: a Latent Class Analysis Among Spanish Adolescents International Journal of Environmental Research and Public Health Article Cyberbullying and Social Anxiety: A Latent Class Analysis among Spanish Adolescents María C. Martínez-Monteagudo 1 , Beatriz Delgado 1,* ,Cándido J. Inglés 2 and Raquel Escortell 3 1 Department of Developmental Psychology and Didactic, University of Alicante, 03690 Alicante, Spain; [email protected] 2 Department of Health Psychology, Miguel Hernandez University of Elche, 03202 Alicante, Spain; [email protected] 3 Faculty of Education, International University of La Rioja, 26006 Logrono, Spain; [email protected] * Correspondence: [email protected]; Tel.: +34-965-903-495 Received: 29 November 2019; Accepted: 6 January 2020; Published: 8 January 2020 Abstract: Cyberbullying is a common social maladjustment that has negative repercussions on the wellbeing and development of adolescents, but numerous questions remain as to the relationship between cyberbullying and social anxiety in adolescence. This study analyzes cyberbullying profiles (screening of harassment among peers) and assesses whether these profiles vary with respect to the level of social anxiety (social anxiety scale for adolescents). The sample consisted of 1412 Spanish secondary education students aged 12 to 18 (M = 14.36, SD = 1.65). Latent class analysis and ANOVA were performed. Analyses revealed three profiles: high cyberbullying (high victimization, aggression, and aggression-victimization), low cyberbullying (moderate victimization, aggression, and aggression-victimization), and non-cyberbullying. The cyberbullying patterns varied significantly for all social anxiety subscales. Students with the high cyberbullying profile (bully–victims) presented high scores on social avoidance and distress in social situations in general with peers, whereas these students presented lower levels of fear of negative evaluation and distress and social avoidance in new situations as compared to the low cyberbullying (rarely victim/bully) and non-involved student profiles. Implications for psychologists and educational counselors and cyberbullying preventive interventions are discussed. Keywords: cyberbullying; victimization; aggression; social anxiety; adolescence 1. Introduction Over the past decade, a major increase has been seen in news of bullying carried out by school-aged children using the new information and communication technologies (ICT). The ICT and social networks have become indispensable communication tools, especially for youth. This widespread use has offered many advantages; however, it has also led to some new violent behaviors resulting from the inappropriate use of these technologies. So, some students having a great domain of the ICT have taken advantage of these new virtual scenarios to engage in aggressive behavior towards their peers (such as insults, humiliation, coercion, the publication of confidential information, threats, denigration, violation of privacy, social exclusion, the spreading of rumors, identity theft, the dissemination of physical assaults, etc.). This phenomenon, known as cyberbullying, is defined as “a type of aggressive and intentional behavior that repeats frequently over time through the individual or group use of electronic devices with a victim that is unable to easily defend him/herself” ([1], p. 376). The prevalence of cyberbullying has varied considerably in the studies that have been carried out until now. International reviews have reported mean prevalences ranging from 4% to 36% for Int. J. Environ. Res. Public Health 2020, 17, 406; doi:10.3390/ijerph17020406 www.mdpi.com/journal/ijerph Int. J. Environ. Res. Public Health 2020, 17, 406 2 of 13 cybervictimization and 16 to 18% for cyberaggression [2,3]. In a recent meta-analysis, Modecki, Minchin, Harbaugh, Guerra, and Runions (2014) found variations in prevalence ranging from 5 to 32% for cyberaggressors (mean of 16%) and between 2 and 56% for victims of cyberbullying (mean of 15%) [4]. These large variations may be due to differing conceptualizations of cyberbullying, the cut-off point criteria used to establish the frequency, the time framework established (an incident taking place during the past two months, last year, at any time, etc.), the type of methodology used, sample age range, etc. 1.1. Roles in Cyberbullying The scientific literature has established three main roles with regard to this issue: victims, aggressors, and non-involved [5,6], with this being the most parsimonious classification. It is possible for aggressors to have previously been victims, with these students becoming aggressors in an attempt to earn a reputation of being strong and capable of defending themselves, and thus, the aggressor/victim role is created [6–9]. Studies have analyzed student roles in cyberbullying through the creation of cut-off scores that are based on statistical distributions that permit the assignment of the participants to one of these roles [5,10,11]. So, modification of the cut-off points alters the number of students belonging to a specific group, such that the stricter the established cut-off point, the lower the proportion of student aggressors [10], suggesting that these cut-off points may be relatively arbitrary. This problem may be overcome using person-centered analytical approaches, such as cluster analysis and latent class analysis (LCA). With these analyses, student groups are generated based on specific indicators, permitting the creation of distinct groups based on the students’ real participation, with members of the same group having similar experiences that are distinct from those of other groups to which they do not belong. So, Aoyama, Bernard-Brak, and Talbert (2011), using cluster analysis with a sample of 133 US adolescents, identified four groups of roles involved in cyberbullying. The majority of the sample belonged to the “least involved” group (51.1%), 12.8% were “highly involved as bully and victim”, 10.5% were “more bully than victim”, and 9.8% were “more victim than bully” [12]. Along these lines, Schultze-Krumbholz et al. (2015), using LCA in an extensive sample of 6260 youth from six European countries, found that the majority of the sample belonged to the “non-involved” group (70.1%), while the “bully/victim” group was made up of 26.1% of the students and, a last group, the so-called “perpetrator with mild victimization” group, consisted of 4% of the selected sample [13]. Barboza (2015) used LCA to identify four categories: “highly victimized by both bullying and cyber bullying behaviors” (3.1%); “victims of relational bullying, verbal bullying, and cyber bullying” (11.6%); “victims of relational bullying, verbal bullying, and physical bullying but were not cyber bullied” (8%); and “non-victims” (77.3%) [14]. Hollá (2016), found three groups of students using LCA in a sample of 1619 Slovakian children and adolescents aged 11 to 18. Here, 52.9% of the students belonged to the “uninvolved” group while 42.7% were part of the “victims” group and 4.4% belonged to the “victims–aggressors” group [15]. In a more recent study, Betts, Gkimitzoudis, Spenser, and Baguley (2017), using a sample of 440 British students aged 16 to 19, identified four student profiles using a cluster analysis technique: “not involved” (33%), “rarely victim and bully” (40%), “typically victim” (26%), and “retaliator” (1%) [16]. In a subsequent study, Schultze-Krumbholz, Hess, Pfetsch, and Scheithauer (2018) used LCA on a sample of 849 German students (11 to 17 years of age), determining five groups: “prosocial defenders”, “communicating outsiders”, “aggressive defenders”, “bully–victims”, and “assistants” [17]. A summary of studies on cyberbullying with a person-centered analytical approach are presented in Table1. So, past empirical research supports the presence of distinct profiles in relation to cyberbullying. However, the results of these studies differ, most likely due to the distinct conceptualizations of cyberbullying, the type of methodology used, or the frequency considered necessary to consider the behavior “cyberbullying”. These inconclusive results support the need to continue analyzing the roles Int. J. Environ. Res. Public Health 2020, 17, 406 3 of 13 in cyberbullying to offer greater clarification about its functioning and to develop actions aimed at the effective prevention of the cyberbullying. Table 1. Summary of the studies reviewed. Source Country Subjects Method Classes 51.1% least involved 12.8% 133 high school highly bully and Aoyama et al., 2011 USA students Cluster analysis victim 10.5% more (Mage = 15.7) bully than victim 9.8% more victim than bully 77.3% non-victims 11.6% victims of relational and verbal bullying and cyberbullying 8% 5589 students victims of Barboza, 2015 USA LCA (aged 12–18) relational, verbal and physical bullying 3.1% highly victimized by both bullying and cyberbullying 33% not involved 40% rarely victim 440 students Betts et al., 2017 United Kingdom Cluster analysis and bully 26% (aged 16–19) typically victim 1% retaliator 52.9% uninvolved 1619 students Hollá, 2016 Slovakia LCA 42.7% victims 4.4% (aged 11–18) victims–aggressors 70.1% Poland, Spain, Italy, non-involved 26.1% Schultze-Krumbholz 6260 students United Kingdom, LCA bully/victim 4% et al., 2015 (aged 11–23) Germany, Greece perpetrator with mild victimization 52.2% prosocial defenders 28.4% communicating Schultze-Krumbholz 849 students outsiders 9.5% Germany LCA et al., 2018 (aged 11–17) aggressive defenders 7.1% bully–victims 2.8% assistants 1.2. Cyberbullying Roles and Social Anxiey Numerous studies
Recommended publications
  • Cyber Violence Against Women and Girls
    CYBER VIOLENCE AGAINST WOMEN AND GIRLS A WORLD-WIDE WAKE-UP CALL 2015 Photo credits:Shutterstock A REPORT BY THE UN BROADBAND COMMISSION FOR DIGITAL DEVELOPMENT WORKING GROUP ON BROADBAND AND GENDER CYBER VIOLENCE AGAINST WOMEN AND GIRLS: A WORLD-WIDE WAKE-UP CALL Acknowledgements This Report has been written collaboratively, drawing on insights and rich contributions from a range of Commissioners and Expert Members of the Working Group on Broadband and Gender. It has been researched and compiled by lead author Nidhi Tandon, assisted by Shannon Pritchard, with editorial inputs by teams from UN Women, UNDP and ITU. Design concepts were developed by Céline Desthomas of ITU. We wish to thank the following people for their contributions and kind review and comments (listed in alphabetical order of institution, followed by alphabetical order of surname): Dafne Sabanes Plou, Jac sm Kee and Chat Garcia Ramilo (APC); Dr Nancy Hafkin; Minerva Novero- Belec (UNDP); Corat Suniye Gulser (UNESCO); Jennifer Breslin and team (UN Women); Samia Melhem and team (World Bank). About the Commission The Broadband Commission for Digital Development was launched by the International Telecommunication Union (ITU) and the United Nations Educational, Scientific and Cultural Organization (UNESCO) in response to UN Secretary-General Ban Ki-moon’s call to step up efforts to meet the Millennium Development Goals. Established in May 2010, the Commission unites top industry executives with government leaders, thought leaders and policy pioneers and international agencies and organizations concerned with development. The Broadband Commission embraces a range of different perspectives in a multi-stakeholder approach to promoting the roll-out of broadband, as well as providing a fresh approach to UN and business engagement.
    [Show full text]
  • OCSA Bullying/Cyberbullying/Hate Violence Policy
    OCSA BULLYING/CYBER BULLYING/HATE VIOLENCE POLICY All students and employees of the Orange County School of the Arts have the right to work, to attend school, and to participate in the educational process in a safe environment that is free from bullying and hate-motivated behavior. Every effort shall be made to promote mutual respect among students and staff and between and among students to encourage safe and harmonious relations that support human dignity and equality. The OCSA Board of Trustees recognizes the harmful effects of bullying on student learning and school attendance and desires to provide safe school environments that protect students from physical and emotional harm. School employees shall establish student safety as a high priority and shall not tolerate bullying of any student. No student or group of students shall, through physical, written, verbal, or other means, harass, sexually harass, threaten, intimidate, cyberbully, cause bodily injury to, or commit hate violence against any other student or school personnel. Students who have been bullied or cyberbullied shall promptly report such incidents to any staff member. Behavior or statements that degrade, intimidate, and/or harm an individual on the basis of his/her race, ethnicity, culture, heritage, immigration status, gender, sexual orientation, physical/mental attributes, religious beliefs or practices shall not be tolerated. Bullying in any form or platform, repeatedly picking fights with, or repeatedly taunting another person shall not be tolerated. This policy applies to all OCSA students and employees. This policy applies to all acts related to school activity or school attendance occurring within a school under the jurisdiction of the Executive Director of the Orange County School of the Arts.
    [Show full text]
  • The Challenges of Cyberbullying
    NEW ENCOUNTERS? THE CHALLENGES OF CYBERBULLYING Professor Shauna Van Praagh & Alyssa Wiseman November 17, 2015 What is Cyberbullying? "A person is bullied when he or she is exposed, repeatedly and over time, to negative actions on the part of one or more other persons, and he or she has difficulty defending himself or herself." - Dan Olweus (1993 and before) -An Act to prevent and stop bullying and violence in schools, 2012 Definition is fairly consistent worldwide—entails three criteria: (1) Verbal or physical aggression; (2) That is repeated over time; and (3) That involves a power differential. “Sticks and Stones” “I couldn’t write about online bullying without writing about face-to-face bullying too because Facebook and other social networking sites aren’t a discrete, walled off universe.” (39) - Emily Bazelon, “Sticks and Stones: Defeating the Culture of Bullying and Rediscovering the Power of Character and Empathy Despite wide media attention, cyberbullying is not necessarily more widespread than face-to-face bullying. Still, cyberbullying presents new concerns... “Sticks and Stones” New concerns include: (1) The Internet makes bullying harder to escape; (2) The Internet allows the perpetrator to bully without having to confront his or her victim; (3) The number of potential witnesses can be exponentially higher; and (4) There is the possibility that comments and images/ videos can go viral. Also, with undefined boundaries, whose responsibility is it to prevent or “deal” with cyberbullying? “It’s Complicated” danah boyd brings to light problematic tendencies and reactions: (1) Scapegoating technology: easier to focus on what is tangible rather than broader systemic issues at play; (2) Parental nostalgia: we idealize our childhoods and forget the problem we faced when we were young; (3) “Digital natives”: draws away attention from the problems children face in the digital era In creating these divides, different stakeholders may absolve themselves of responsibility.
    [Show full text]
  • CYBERBULLYING Bullying Is Aggressive Behavior That Is Intentional and Involves an Imbalance of Power Or Strength
    From the Stop Bullying Now Website http://www.stopbullyingnow.hrsa.gov/adults/cyber-bullying.aspx CYBERBULLYING Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as: hitting or punching (physical bullying), teasing or name-calling (verbal bullying), or intimidation through gestures or social exclusion. In recent years, technology has given children and youth a new means of bullying each other. Cyberbullying, which is sometimes referred to as online social cruelty or electronic bullying, has been defined as "an aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend him or herself" (Smith et al., 2008, p. 376). Cyberbullying can involve: • Sending mean, vulgar, or threatening messages or images • Posting sensitive, private information and/or lies about another person • Pretending to be someone else in order to make that person look bad • Intentionally excluding someone from an online group (Willard, 2005) Children and youth can cyberbully each other through: • Emails • Instant messaging • Text or digital imaging messages sent on cell phones • Social networking sites • Web pages • Blogs • Chat rooms or discussion groups • Other cyber technologies Bullying via instant messaging appears to be particularly prevalent (Dehue et al., 2008; Kowalski et al., 2008). How Common Is Cyberbullying? Research studies have produced different answers to this question. Rates of cyberbullying vary depending on the definition of cyberbullying that is used, the ages and characteristics of children surveyed, and the time frame involved (Kowalski & Limber, under review).
    [Show full text]
  • Intersectional Invisibility (2008).Pdf
    Sex Roles DOI 10.1007/s11199-008-9424-4 ORIGINAL ARTICLE Intersectional Invisibility: The Distinctive Advantages and Disadvantages of Multiple Subordinate-Group Identities Valerie Purdie-Vaughns & Richard P. Eibach # Springer Science + Business Media, LLC 2008 Abstract The hypothesis that possessing multiple subordi- Without in any way underplaying the enormous nate-group identities renders a person “invisible” relative to problems that poor African American women face, I those with a single subordinate-group identity is developed. want to suggest that the burdens of African American We propose that androcentric, ethnocentric, and heterocentric men have always been oppressive, dispiriting, demor- ideologies will cause people who have multiple subordinate- alizing, and soul-killing, whereas those of women group identities to be defined as non-prototypical members of have always been at least partly generative, empower- their respective identity groups. Because people with multiple ing, and humanizing. (Patterson 1995 pp. 62–3) subordinate-group identities (e.g., ethnic minority woman) do not fit the prototypes of their respective identity groups (e.g., ethnic minorities, women), they will experience what we have Introduction termed “intersectional invisibility.” In this article, our model of intersectional invisibility is developed and evidence from The politics of research on the intersection of social historical narratives, cultural representations, interest-group identities based on race, gender, class, and sexuality can politics, and anti-discrimination legal frameworks is used to at times resemble a score-keeping contest between battle- illustrate its utility. Implications for social psychological weary warriors. The warriors display ever deeper and more theory and research are discussed. gruesome battle scars in a game of one-upmanship, with each trying to prove that he or she has suffered more than Keywords Intersectionality.
    [Show full text]
  • Studies on Peer Victimization and Social Exclusion from A
    Patrik Söderberg Not Only Bad Luck Studies on Peer Victimization and Social Exclusion from a Multilevel Perspective Adolescent victimization and social exclusion are universal phenomena with long-term negative Patrik Söderberg mental health consequences. Meanwhile, studies on the effectiveness of anti-bullying programs have yielded mixed result. Patrik Söderberg | Not Only Bad Luck | 2018 Söderberg | Not Only Bad Luck Patrik Not Only Bad Luck This thesis adopts a multilevel approach to explore the bi-directional relationships between psycho- Studies on Peer Victimization and Social Exclusion social maladjustment and peer victimization, in settings that participants have little to no choice from a Multilevel Perspective but to belong to, such as nomadic forager band societies, modern high-school classrooms, and the family environment. Based on the results, the thesis suggests that whole-school programs should continue to pro- mote inclusiveness and diversity, but should also acknowledge the impact of individual characteris- tics and family adversities on peer victimization. 9 789521 237393 ISBN 978-952-12-3739-3 Patrik Söderberg Born 1980 in Vasa, Finland Studies, exams, and present occupation: Master’s degree in Developmental Psychology at Åbo Akademi University in 2010 Bachelor’s degree in Political Science at Åbo Akademi University in 2009 Patrik Söderberg is currently working as a university teacher in Developmental Psychology within the Faculty of Education and Welfare Studies at Åbo Akademi University in Vasa, Finland. His research and teaching interests include peer victimization, social inclusion, gene- environment interaction, and youth political participation. Portrait photo: Raija Skyttälä, Foto Airaksinen Cover photo: User PublicDomainPictures on Pixabay, released under Creative Commons CC0 Åbo Akademi University Press Tavastgatan 13, FI-20500 Åbo, Finland Tel.
    [Show full text]
  • How Does Individualism-Collectivism Relate to Bullying Victimisation?
    International Journal of Bullying Prevention https://doi.org/10.1007/s42380-018-0005-y ORIGINAL ARTICLE How Does Individualism-Collectivism Relate to Bullying Victimisation? Peter K. Smith 1 & Susanne Robinson1 # The Author(s) 2019 Abstract Large-scale surveys have pointed to considerable country variations in the prevalence and nature of bullying victimisation. In seeking to explain these, one possible explanatory factor has been the cultural values of a country, such as expounded by (Hofstede 1980; Hofstede et al. 2010). Of his six dimensions of cultural values, the most investigated in relation to aggression and bullying has been that of individualism-collectivism (IDV). The theoretical background and several empirical studies have suggested more aggression in individualist societies, but the evidence has been mixed and often based on small samples. Here, we investigate how the prevalence of victimisation in different countries relates to IDV. We also examine predictions about the proportion of bullying which is relational and the ratio of bullies to victims. We primarily used the Health Behaviour in School- aged Children surveys, available at 3 age groups and over six time points. We also use data from 4 other surveys where appropriate. The overall findings are for less victimisation in individualist societies, but only in more recent years; some support for a greater proportion of relational victimisation in individualist societies and a higher ratio of bullies to victims in collectivist societies. The findings are discussed in relation to other factors, and a hypothesis is advanced that regulatory frameworks and resources have reduced victimisation primarily in more individualist societies in the last two decades.
    [Show full text]
  • C96e3b9693564ffee85f3615c77
    SEFARAD, vol. 72:2, julio-diciembre 2012, págs. 325-350 ISSN: 0037-0894, doi: 10.3989/sefarad.012.010 Construcción y deconstrucción del converso a través de los memoriales de limpieza de sangre durante el reinado de Felipe III ∗ Juan Hernández Franco, Antonio Irigoyen López ** Universidad de Murcia En este artículo ponemos de relieve cómo el gran momento de la reforma de los esta- tutos de limpieza de sangre, que tendrá lugar en la segunda década del siglo XVII, tiene un destacado e intenso prolegómeno, que se fecha a partir del último tercio del Quinientos. En un ambiente mayoritariamente partidario de la ideología de los cristianos viejos y su propósito de excluir a los conversos de los honores sociales, tímidamente tanto Felipe II, en sus últimos años de vida, como Felipe III, la Inquisición y en concreto inquisidores generales como Quiroga, Niño de Guevara y Rojas, o bien sobresalientes religiosos como Rivadeneira, de las Casas y Montemayor, van a dar su apoyo en unos casos y a revisar en otros la conducta con la que se asocia al converso. Los últimos harán hincapié en su condi- ción de cristianos auténticos y las ventajas que reportaban sus conocimientos y formación para la sociedad y sus instituciones. PALABRAS CLAVE: Estatutos de limpieza de sangre; exclusión social; intolerancia; cris- tianos viejos; conversos; identidad socio-religiosa. * Este trabajo forma parte del proyecto de investigación 15300/PHCS/10 Nobilitas. Estudios y base documental de la nobleza del Reino de Murcia, siglos XV-XIX. Segun- da fase: análisis comparativos, financiado por la Fundación Séneca: Agencia regional de Ciencia y Tecnología de la Región de Murcia; del proyecto de investigación 11863/ PHCS/09: El legado de los sacerdotes.
    [Show full text]
  • Social Exclusion Topic Guide
    TOPIC GUIDE ON SOCIAL EXCLUSION Seema Khan About this guide This GSDRC resource guide aims to introduce some of the best literature on the definitions, understandings, causes, and impact of social exclusion, as well as the ways in which exclusion can be measured and addressed by governments, civil society actors and international organisations. It also highlights the major debates taking place on the issue within the international development and academic communities. It is intended primarily as a reference guide for policymakers. New publications and emerging issues will be incorporated on a quarterly basis. The guide was written by Seema Khan (GSDRC), in close collaboration with Professor Frances Stewart (Centre for Research on Inequality, Human Security and Ethnicity), Dr Rosalind Eyben (Institute of Development Studies) and Professor Bina Agarwal (University of Delhi). The GSDRC also appreciates the contributions made by Dr Rosamund Ebdon (DFID). The guide was last updated by Erika McAslan Fraser. Comments, questions or documents can be sent to [email protected]. About the GSDRC The Governance and Social Development Resource Centre (GSDRC) provides cutting-edge knowledge services on demand and online. It aims to help reduce poverty by informing policy and practice in relation to governance, conflict and social development. The GSDRC receives core funding from the UK Department for International Development (DFID) and the Australian Agency for International Development (AusAID). www.gsdrc.org First published December 2009 This revised edition published February 2012 © International Development Department, University of Birmingham Contents Introduction ..................................................................................................................... 4 Definitions and different understandings of social exclusion ............................................. 5 What are the socially excluded excluded from? ........................................................................
    [Show full text]
  • Social Exclusion: Concept, Application, and Scrutiny
    SOCIAL EXCLUSION: CONCEPT, APPLICATION, AND SCRUTINY Amartya Sen Master of Trinity College, Cambridge, and Lamont University Professor Emeritus, Harvard University Social Development Papers No. 1 Office of Environment and Social Development Asian Development Bank June 2000 i © Asian Development Bank All rights reserved Published June 2000 The analyses and assessments contained herein do not necessarily reflect the views of the Asian Development Bank, or its Board of Directors or the governments they represent. ISBN 971-561-274-1 Publication Stock No. 120299 Published by the Asian Development Bank P.O. Box 789, 0980 Manila, Philippines ii CONTENTS Foreword v Acknowledgements vi 1. The Task of Evaluation and Assessment 1 2. Poverty, Capability Deprivation, and Social Exclusion 3 3. Relational Features in Capability Deprivation 6 4. The Language of Exclusion 9 5. Social Relations: Constitutive and Instrumental Importance 12 6. Active and Passive Exclusion 14 7. Persistent Unemployment and Exclusion: An Illustration 18 8. European Origin, Universal Importance, and Asian Use 23 9. Practical Reason in a Changing World 27 10. Policy Issue: Sharing of Social Opportunities 30 11. Policy Issue: Asian Crisis and Protective Security 35 12. Policy Issue: Democracy and Political Participation 38 13. Policy Issue: Diversity of Exclusions 40 14. Concluding Remarks 44 References 48 iii iv FOREWORD This paper is the first in a series of Social Development Papers, which are being issued to promote discussion of social development issues that influence development and poverty reduction. We are pleased that the inaugural paper in the series is an exposition by Nobel laureate Amartya Sen on an important and often overlooked dimension of poverty–social exclusion.
    [Show full text]
  • Sweden National Reporting Procedures for Cyberbullying, Hate Speech and Hate Crime
    Reporting in Sweden National reporting procedures for cyberbullying, hate speech and hate crime The information below is extracted from a mapping study of national reporting mechanisms in the countries involved in the No Hate Speech Movement of the Council of Europe. It aims to provide: 1. Contact information of national reporting mechanisms for cyberbullying, hate speech and hate crime where they exist 2. Information about the legal grounds for acting on cyberbullying, hate speech and hate crime where they exist The views expressed in this document do not necessarily reflect the opinions of the Council of Europe1. 1. REPORTING MECHANISMS Reporting hate speech and hate crime Polisen (the police). Website: http://polisen.se Phone:+46 114 14. Reporting cyberbullying If the cyberbullying is connected to the school one should report it to the school management or a teacher. For other cases one can turn to the police. 2. Background information There is no Swedish word that translates hate speech in Swedish. There is a term called “hate against a community”. Another is “discrimination”. Hate speech online can also be called bullying or harassment. Sweden does not have a distinction between hate speech and hate crime that we know of. The Discrimination Act includes discrimination on the basis of sex, transgender identity or expression, ethnicity, disability, sexual orientation and age. People can report everything that is against the law at the police station or by phone. Reports will be investigated by the police. In 2014 there were almost 6270 reports of hate crime in Sweden. That was an increase with 14 % compared to 2015.
    [Show full text]
  • A Global Outlook on LGBTI Social Exclusion Through 2030
    A Global Outlook on LGBTI Social Exclusion through 2030 Image by Sergey Neamoscou 1 Contents Acknowledgements 3 Key findings 4 Executive summary 5 Purpose and methodology 6 Key terms 7 Social exclusion 8 Estimates of the global LGBTI population 10 Heavy trends in LGBTI social exclusion 11 Critcal uncertainties in LGBTI social exclusion 14 Scenarios 20 Slow going 21 Progress and persecution 22 Hollow victories 23 Institutions as leaders 24 Conclusion 25 Annex: Scenario analysis methods 26 References 32 2 Acknowledgments We would like to thank the following experts for their The majority of the photos used in this report have been taken by contributions to the development of this report. Sergey Neamoscou. We have been given permission from Sergey to include these, and most importantly have been given informed • Sam Avrett, The Fremont Center consent from the individuals themselves, to include their portraits within this report and its affiliated campaign materials. All of these • Kent Klindera, MPH, United States Agency for International individuals are aged 18 and above. The other photos used in this Development / Office of HIV/AIDS (USAID/OHA) report come from the free to use website, www.unspash.com . • Bruno Spire, INSERM and AIDES The Inter-Agency Regional Analysts Network (IARAN) is a global consortium of operational aid agencies and academic • Mutawakilu Mohammed, Center for Popular Education and institutions, with a team of analysts working around the world. Human Rights, Ghana (CEPEHRG) The IARAN has over five years experience in providing strategic foresight analysis to the humanitarian sector. • Pallav Patankar, ALMATA The IARAN supports humanitarian actors in managing future • George Ayala, PsyD, MSMGF (the Global Forum on MSM uncertainty through the use of techniques like scenario analysis & HIV) and strategic planning so non governmental organisations (NGOs) can be better positioned for the future by examining the • Karim Ladak, LBGT+ Activist, Toronto different ways it could unfold over the next one to fifteen years.
    [Show full text]